The internet Flashcards

1
Q

what is the internet

A

a network of interconnected networks set up to allow computers to communicate with each other globally
that use the standard Internet Protocol Suite (TCP/IP) to communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

when can the internet be used without the world wide web

A
  • using email protocols like SMTP to send messages and IMAP to receive them
  • file sharing
  • voice calls
  • gaming
  • messaging apps
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

structure of the internet - backbone

A
  • the main part of the internet
  • set of dedicated connections that connect several large networks at various parts of the globe
  • each of these points are then connected to other regional networks
  • usually controlled by ISPS (internet service providers)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are ISPs

A

Internet service providers
- connect to the backbone
- distribute/sell the internet connection to smaller providers
- who then provide access to individual end users/homes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

structure of the internet - internet addresses

A
  • each device on a network needs to be uniquely identified so that data can be sent to the correct destination
  • internet addresses are unique numerical or alphanumerical identifiers used to identify devices or websites on the internet
  • they use the IP address system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

structure of the internet - internet registries

A
  • ensure that a particular domain name is only used by one organisation
  • provides a marketplace for available domain names
  • managed domain names, dispute resolution services
  • registers individual or company details
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Structure of the internet - URL’s

A

A UNIFORM RESOURCE LOCATER is the full address for an internet resource.
it specifies the location/address of a resource on the internet

  • includes the protocol, domain name and a path
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Structure of the internet - Domain names and the Domain name system

A

a domain nameidentifies the area or domain that an internet resource resides in
- human readable address which maps to an IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is a fully qualified domain name

A

one that includes the host server name, eg www, mail,
- www.blahblah.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

structure of the internet - IP addresses

A
  • is a unique address that is assigned to a network device
  • indicates where a packet of data is to be sent or has been sent from
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

describe the main purpose of the DNS system and how it works

A

HOW IT WORKS:
- DNS stores a database of fully qualified domain names and corresponding IP addresses
- DNS is a* distributed database of mappings*
- individual mappings are only known by some DNS servers
- DNS servers are ordered into a hierarchy

PURPOSE:
- Translates fully qualified domain names into IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is circuit switching

A
  • creating a communication connecting two endpoints for the duration of a phone call or transfer of data
  • but wasnt scalable, so packet switching was created
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is packet switching

A

A method of data transmission where messages are split into packets and sent independently through the best available route.
- where other similar communications are happening simultaneously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what are data packets
how many bytes of data does each packet usually contain?
what does each packet contain?

A

equal sized chunks that data is broken up into when sending data across a network
- each packet typically contains 1,500 bytes of data
- each packet contains a header and a payload containing the body of data being sent
- some packets may also use a trailer with a checksum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

advantages of data packets

A

increases network efficiency and reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is a checksum

Outline how the checksum’s value will be determined

A
  • Something to check if the contents of the
    packet have been corrupted during transmission
  • Calculated from the
    payload of the packet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is the header

A

includes:
- the senders and recipients IP addresses
- the protocol being used in the packet
- the number of the packet in the sequence being sent
- also include the hop limit/time to live
- packet length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what is the hop limit or TTL(time to live)

A

the point at which the data packet expires and is discarded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

why is the senders IP address included in the packet header

A
  • in order to identify the sender
  • to send a request back to the sender if it contains data transmission errors
  • to notify the sender if the packet cannot be delivered.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what do routers do

A
  • Connects two networks together
  • determines which node to send packet to next
  • Router uses most efficient path to the destination
  • Router modifies the (MAC/hardware) addresses for the next hop
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what is a hop

A

each forwarding by(or transfer across) a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what is a routing algorithm

A

used to find the optimum route

23
Q

what is a gateway
what is the functionality of a gateway beyond that of a router

A
  • a device that is required where data is travelling from one network to another that use different protocols
  • networks using different transmission media can require this

2.protocol conversion

24
Q

how does a gateway work

A
  • all of the header data is stripped from the packet, leaving only the raw data
  • the new header data is added in the format of the new network before the gateway sends the packet on its way
25
packet size
- kept small to ensure that individual packets do not take excessive time to transfer - preventing other packets from moving - However, they should not be too small, as the additional data added makes data transfer inefficient as unnecessary headers and trailers are used
26
summarise the packet trailer
- contains the error checking component (checksum)
27
describe the operations of packet switching
- data broken down into packets - source/destination IP is added to each packet - packet routed independently - packets reassembled into message - errors are checked for - if theres an error, request for corrupted packets to be resent
28
what is a firewall
a software or hardware that controls access to and from a network - it prevents unauthorised access between two networks
29
what does a firewall consist of
- a separate computer with 2 NICs(network interface cards), with one connected to the trusted network, and the other connected to the external one
30
what is a port
gates that only certain types of traffic is allowed to pass through, dependent on its IP addresses
31
summarise packet filtering
- packets of data are **inspected by the firewall to check which point they want to access** - different protocols use different numbers - if this traffic is allowed through, **the port must be opened for the duration of the connection** - otherwise, the firewall will automatically reject it
32
what does packet filtering do
controls network access according to network administrator rules and policies - by examining the source and destination IP addresses in packet header
33
what port does HTTP traffic use
80 or 808
34
What is stateful inspection in a firewall
- used instead of relying on port numbers or IP addresses - it **examines the payload of a packet to better assess it for safety, before allowing access** -tracks the state of active connections and allows packets that are part of an established connection.
35
meaning of proxy
on behalf of
36
what is a proxy server
- makes a web request **on behalf of your own computer** - **intercepts** all packets entering and leaving a network - **hides the true network address **of the source from the recipient
37
advantages of a proxy server
- enables privacy - can be used to filter undesirable content - logs user data with their requests - enables anonymous surfing - can maintain a cache of websites commonly visited to speed access times
38
what is encryptionnn
the act of encoding a plaintext msg so that it cannot be deciphered unless unless u have a key to decrypt it
39
what is symmetric encryption
when the same key is used to encrypt and decrypt
40
risks of using symmetric encryption
- If either party loses the key or it is stolen, the system is broken. If the key is also intercepted along with the data, the message can be deciphered. 2. Man-in-the-Middle (MITM) Attack: - During key exchange, an attacker intercepts the shared key and decrypts the communication. - Complete compromise of confidentiality and privacy; attackers can read or alter data undetected.
41
what is asymmetric encryption
using separate but related keys
42
summarise asymmetric encryption
- the public key is made public so that others can send data and encrypt the data - public key CANNOT decrypt data - a private key is known only by you and can be used to decrypt data - impossible to deduce the private key from the public key
43
how does a digital signature work
1. sender **applies hashing algorithm to message to create a hash value** 2. hash calculated from message text 3. hash encrypted using senders **private key** 4. creates digital signature 5. **signature appended to message** 6. message with signature needs to be encrypted **using receivers public key** 7. signature **decrypted using senders private key** 8. hash value **recalculated and compared** 9. A match is accepted as genuine
44
what is a digital signature
a security stamp that offers greater security
45
what is a digital certificate
something that verifies that a senders public key is formally registered to that particular sender
46
features of a digital certificate
- issued by the CA(Certificate authorities) contains: - serial number - expiry date - subjects public key - name id the CA
47
what does a firewall do
- blocks/allows traffic on specific ports - blocks specific protocols - blocks specific IP addresses - Blocks/allows certain types of packets - acts as a proxy server - identifies unusual behaviour from hosts
48
1. Why is packet switching used? 2. What is the role of routers in packet switching?
- Packet switching **breaks data into packets and routes them independently across a network** for efficient use of resources. - Routers forward packets to their destination by analyzing their headers and choosing the optimal path.
49
What is the purpose of a digital signature
To verify the authenticity and integrity of a message.
50
difference between well known ports and client ports
Well-known ports are ports that have a specific purpose like HTTP and FTP. Client ports are temporary ports used by devices to establish connections with servers.
51
what other things are included in a data packet
Port number(s); destination port number and source port number as separate marks Sequence number; Time to live; Packet size/length; Type of service; Protocol identifier; Packet identifier/ID number; IP version; Options/Padding; Flags; Window size value; Fragment offset // header length;
52
how is it possible for unauthorised data to be collected via wifi
- wifi signals can travel outside of property - any wifi receiver in range can read the data packets - no need to physically “tap” into a wifi connection, unlike a cabled connection - a protocol that does not encrypt the transmissions may have been used
53
Why are IP addresses not used to access websites instead of alphanumeric addresses?
Domain names are much easier for humans to remember and type in than a string of numbers in an IP address.